Skip to main content

Table 2 Devices configuration in test-bed network environment

From: Low-rate DoS attack detection based on two-step cluster analysis and UTR analysis

Device

Operate system

Software

Function

Legitimate User 1

Windows 7

Python socket

Legitimate user sending network traffic

Legitimate User 2

Windows 7

Python socket

Legitimate user sending network traffic

Legitimate User 3

Windows 7

Python socket

Legitimate user sending network traffic

Attacker

Windows 7

Python socket

LDoS attacker

Server

Windows 7

Python socket

Server receiving network traffic

Router1

Routing Protocol

Forwarding packets

Router2

Routing Protocol

Forwarding packets